CN110782173A - Deduction method for emergency power event of ubiquitous power Internet of things - Google Patents

Deduction method for emergency power event of ubiquitous power Internet of things Download PDF

Info

Publication number
CN110782173A
CN110782173A CN201911047117.4A CN201911047117A CN110782173A CN 110782173 A CN110782173 A CN 110782173A CN 201911047117 A CN201911047117 A CN 201911047117A CN 110782173 A CN110782173 A CN 110782173A
Authority
CN
China
Prior art keywords
event
risk
basic
power
barrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911047117.4A
Other languages
Chinese (zh)
Inventor
吕政权
陈怡君
王海峰
丁雷青
陈京
张涵
王丹豪
李朝阳
刘世彬
喻波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Thick Shang Electric Power Technology Co Ltd
State Grid Shanghai Electric Power Co Ltd
Original Assignee
Shanghai Thick Shang Electric Power Technology Co Ltd
State Grid Shanghai Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Thick Shang Electric Power Technology Co Ltd, State Grid Shanghai Electric Power Co Ltd filed Critical Shanghai Thick Shang Electric Power Technology Co Ltd
Priority to CN201911047117.4A priority Critical patent/CN110782173A/en
Publication of CN110782173A publication Critical patent/CN110782173A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/904Browsing; Visualisation therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Quality & Reliability (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a deduction method of an emergency power event of a ubiquitous power Internet of things, which comprises the following steps of: s1, taking the emergency power event as a top event, performing accident tree analysis, and determining a basic event for triggering the top event and a bottom event for triggering the basic event; s2, determining a minimum cut set of basic events in the accident tree, and calculating the structural importance of each bottom event in the accident tree according to the minimum cut set; s3, performing BowTie risk assessment based on the accident tree, determining a danger source, a risk event, a risk threat and a potential result, and setting a barrier for preventing the occurrence of the emergency power event to perform BowTie risk management and control. The accident tree analysis method is adopted to carry out layer-by-layer deep analysis on the emergency power event, and determine the safety measures corresponding to each bottom event in the accident tree, so that an emergency decision maker can rapidly make scientific judgment, and the occurrence probability of the emergency power event or the severity of potential consequences can be reduced.

Description

Deduction method for emergency power event of ubiquitous power Internet of things
Technical Field
The invention relates to the field of sudden power event fault analysis and deduction, in particular to a method for sudden power event generation under ubiquitous power Internet of things
Background
The ubiquitous power internet of things is a ubiquitous network established on the internet, and the important foundation and core of the technology of the ubiquitous power internet of things is still the internet. With the development of the ubiquitous power internet of things and the application thereof, the complexity of the network layer system environment is increased. Because the ubiquitous power internet of things technology is closely related to the application of the ubiquitous power internet of things technology, in order to meet the application requirements of a distributed heterogeneous environment and realize interoperation and interoperability among applications, it is very important to provide a unified architecture and standard system for the internet of things.
Meanwhile, with the comprehensive construction of the ubiquitous power internet of things, the form of a power grid is gradually complicated, the evolution mechanism of power flow and power grid faults is continuously changed from foreseeable to unpredictable, different evolution modes of transformation, spreading, derivation, coupling, diffusion and the like of power safety emergent power events of the ubiquitous power internet of things are mutually interwoven to form a plurality of emergent power event chains which are crossed together, and an emergent power event evolution network can be finally formed, so that higher requirements are provided for the safe and stable operation of the power grid.
However, the investigation of the power accident usually takes the experience of the investigator as the leading factor, and usually concerns some single links, and the analysis of the accident is only limited to the investigation of the accident reason, so that corresponding measures are taken to prevent the accident from happening again. The investigation mode usually focuses on finding out the obvious reasons of the accident, so that the development process of the accident is difficult to reflect, and the investigation result is not enough to provide a comprehensive scientific basis for the formulation of safety measures. Therefore, the accident needs to be analyzed systematically and comprehensively to determine the basic cause event causing the accident.
Therefore, the multi-integration of the smart power grid has an information security mechanism bottleneck to be overcome urgently, and becomes a research hotspot and difficulty of modern power grid informatization. However, most of research on the deduction method of the emergent power event of the ubiquitous power internet of things for the heterogeneous converged network is still in a qualitative description stage at present.
Disclosure of Invention
The invention provides a deduction method of a ubiquitous power Internet of things emergency power event, which is characterized in that an accident tree analysis method is adopted to carry out deep analysis on the emergency power event layer by layer, determine a direct reason for causing the emergency power event and a potential result after the emergency power event occurs, draw a corresponding protection barrier on the basis of an accident tree analysis graph, determine a safety measure corresponding to the protection barrier, and visually display each level event and the protection barrier in the whole accident.
In order to achieve the purpose, the invention provides a deduction method of an emergency power event of a ubiquitous power internet of things, which comprises the following steps of:
s1, taking the emergency power event as a top event, performing accident tree analysis, and determining a basic event for triggering the top event and a bottom event for triggering the basic event;
s2, determining a minimum cut set of basic events in the accident tree, and calculating the structural importance of each bottom event in the accident tree according to the minimum cut set;
s3, performing BowTie risk assessment based on the accident tree, determining a danger source, a risk event, a risk threat and a potential result, and setting a barrier for preventing the occurrence of the emergency power event to perform BowTie risk management and control.
The calculation formula of the structural importance degree is as follows:
Figure BDA0002254401750000021
in the formula (I), the compound is shown in the specification,
Figure BDA0002254401750000022
a structural importance coefficient for the ith elementary event; k is the total number of the minimum cut sets; k is a radical of jIs the jth minimal cut set; n is jK is the ith basic event jThe number of basic events of the cutset.
Preferably, the barriers for preventing the occurrence of the emergency power event include a defense barrier, a corrective barrier, and a countermeasure barrier against disturbance factors.
Preferably, the defensive measure barriers are established according to the danger source, the risk event and the risk threat of the top event, and the corresponding defensive measure barriers are sequentially established according to the structural importance ranking of the bottom event corresponding to the danger source, the risk event and the risk threat.
Preferably, the event corresponding to the hazard source and/or risk event and/or risk threat is a basic event, and then the first event establishes a defensive measure barrier corresponding to the basic event.
Preferably, the remedial action barrier is established in dependence upon the potential outcome of the overhead event.
Preferably, the countermeasure barrier against the disturbance factor is established in dependence on the disturbance factor that may cause the defense barrier and/or the corrective measure barrier to fail.
The invention has the following advantages:
the accident tree analysis method is adopted to carry out deep analysis on the emergency power event layer by layer, so that not only can the direct reason of the emergency power event be analyzed, but also the potential reason of the accident can be deeply revealed, the corresponding protective barrier is drawn on the basis of the accident tree analysis diagram, the safety measure corresponding to the protective barrier is determined, and the visual display is carried out on all the layer events and the protective barriers in the whole accident, so that a decision maker is clear at a glance, the rapid scientific judgment of the emergency decision maker is facilitated, and the accident can be timely stopped by adopting the correct measure.
Drawings
Fig. 1 is a flowchart of a method for deducing an emergency power event of a ubiquitous power internet of things according to the present invention;
FIG. 2 is a fault tree analysis diagram of a top event in accordance with an embodiment of the present invention;
FIG. 3 is a BowTie visualization analysis diagram according to an embodiment of the invention.
Detailed Description
The following describes in detail a method for deducing an emergency power event of the ubiquitous power internet of things according to the present invention with reference to the accompanying drawings and specific embodiments. Advantages and features of the present invention will become apparent from the following description and from the claims. It is to be noted that the drawings are in a very simplified form and are all used in a non-precise ratio for the purpose of facilitating and distinctly aiding in the description of the embodiments of the invention.
Fig. 1 shows a method for deducing an emergency power event according to the present invention, which includes the following steps:
s1, taking the emergency power event as a top event, performing accident tree analysis, and determining a basic event for triggering the top event and a bottom event for triggering the basic event;
as shown in fig. 2, the top event to be analyzed is denoted as T, the top event T is deeply analyzed layer by layer according to causal relationship, the top event of the layer is initiated by M1 layer events (M11, M12, M13 … … M1n), the M1 layer event is initiated by M2 layer events (M21, M22, M23 … … M2n), … …, the lower level events of the upper level event are analyzed layer by layer, the corresponding reason of each layer event is listed until the basic reason for initiating the top event, namely the bottom event (X1, X2, X3 … … Xn) is found, wherein the middle layer event is called as the basic event, and is finally displayed visually in the form of a tree diagram.
S2, determining a minimum cut set (a minimal set of basic events causing the occurrence of the top events) of the basic events in the accident tree, and calculating the structural importance of each bottom event in the accident tree according to the minimum cut set;
and analyzing the accident tree of the top event by adopting software to obtain a minimum cut set, calculating the structural importance of each bottom event in the accident tree, and sequencing the structural importance of each bottom event. The formula for calculating the structural importance is as follows:
Figure BDA0002254401750000041
in the formula (I), the compound is shown in the specification,
Figure BDA0002254401750000042
a structural importance coefficient for the ith elementary event; k is the total number of the minimum cut sets; k is a radical of jIs the jth minimal cut set; n is jK is the ith basic event jThe number of basic events of the cutset.
The structural importance can be used for structurally analyzing the influence degree of each bottom event on the occurrence of the top event, and the larger the structural importance of the bottom event is, the larger the contribution of the bottom event to the occurrence of the top event is.
S3, performing BowTie risk assessment based on the accident tree, determining a danger source, a risk event, a risk threat and a potential result, and setting a barrier for preventing the occurrence of the emergency power event to perform BowTie risk management and control.
BowTie risk assessment is carried out based on analysis of an accident tree analysis diagram, and analysis is carried out by using past accident experience and related professional knowledge for reference, so that which events are a danger source, a risk event and a risk threat and which events are potential results in basic events and bottom events in the tree diagram are judged; respectively providing corresponding advanced troubleshooting methods and defense measure barriers for the danger source, the risk event and the risk threat, sequentially establishing corresponding defense measure barriers according to the structural importance of the bottom event corresponding to the danger source, the risk event and the risk threat, and preferentially establishing the defense measure barriers corresponding to the basic event if the danger source and/or the risk event and/or the event corresponding to the risk threat is the basic event; providing a preventive method for the potential result and a barrier of corrective measures to be taken after the potential result occurs; analyzing interference factors which may cause the failure of defense measure barriers and/or corrective measure barriers, providing measure barriers of the interference factors with anti-interference factors, and finally drawing the methods and the measure barriers on the basis of the tree diagram to make a BowTie visual analysis diagram.
The eight major elements of the BowTie visual analysis graph include hazard sources, risk events, risk threats, potential outcomes, defensive action barriers, corrective action barriers, interference factors, and action barriers to interference factors.
The source of danger is a condition, object or activity that could potentially cause casualties, equipment structural damage, material dysfunction. Any source of possible injury or loss is a source of risk, but the source of risk is not meant to be a consequence, and the description of the source of risk should not include a consequence.
The risk events occur along with the secondary risk sources, each risk event has a corresponding risk source, each risk source can be accompanied by a plurality of risk events, and the event consequences are not included in the risk events.
The risk threat is the cause or possibility of a source of danger arising from the occurrence of a risk event. Each risk threat must have one outcome, but multiple risk threats may have one outcome. Each risk threat exists independently, and the two risk threats do not interfere with each other or influence each other.
The potential results are the possible consequences after the risk event occurs, and each potential result must correspond to at least one risk threat.
Said barriers to defensive and/or corrective actions can be generally subdivided into 4 types, depending on the stage and extent of the action to be performed: the risk threat can be directly avoided by adopting a clearance measure; preventive measures, which can avoid the occurrence of risk events after the occurrence of risk threats; a reducing measure that reduces the likelihood of a potential outcome after a risk event has occurred; and the loss stopping measure reduces the loss caused by the potential result after the potential result appears.
The interference factors are often the reasons for the failure of a certain measure barrier, and according to the requirements of actual conditions, the interference factors are analyzed by combining with relevant professional knowledge on each prevention/measure barrier, or the interference factors are analyzed for a certain measure barrier or certain measure barriers with lower effectiveness, so that a special measure barrier is made for the interference factors, and finally closed-loop control is achieved.
The principle of the measure barrier against interference factors is the same as that of a preventive/corrective measure barrier, and the measure barrier against interference factors can be divided into: clearance measures, preventive measures, reduction measures, and damage-stopping measures.
Examples
The invention provides a deduction method of emergent power events of a ubiquitous power internet of things, and large-scale power failure faults of Argentina and yerba mate interconnected power grids are analyzed by the method, and the method comprises the following steps of:
s1, taking the emergency power event as a top event, performing accident tree analysis, and determining a basic event for triggering the top event and a bottom event for triggering the basic event;
determining that 'large-scale power failure fault occurs in Argentina and Uyery interconnected power grids' is a top event, and investigating or analyzing a direct reason causing the top event. After data review and analysis, the direct causes of large-scale faults of the Argentina and Uyery interconnected power grids are mainly the Argentina power grid fault (M11) and the Uyery large-area power failure (M12).
Through analysis, the reason for causing the event M12 is mainly two: the failure of the inter-network fusion (X1) and the failure of the full-time power grid personnel to make correct treatment measures (X2). After Argentina electric wire netting trouble takes place, the relevant department of electric power of Utraguay fails to defend in advance in the bud, fail to in time correctly handle to foreign cross-network connection trouble, take correct method to remedy, cause the electric wire netting of this country to receive adjacent national grid to influence and produce the power failure incident, so the two makes up the reason of the large tracts of land accident Utraguay power failure jointly, if one of them is not standing, then the large tracts of land power failure incident of this case just can not take place, its relation is: m12 ═ X1 × X2.
Through analysis, the reason for causing the event M11 is mainly two: the cross-network authentication process of the Argentina power grid is subjected to network attack (M21) and misoperation (X3) caused by the fact that full-time personnel of the power grid fail to correctly authenticate the authorization of the child node, and the simultaneous occurrence of the two events M21 and X3 causes an event M11 to occur, wherein the relationship is as follows: m11 ═ M21 × X3.
Through analysis, five reasons are found to cause the event M21: the power grid control center node verifies that the child node fails to pass the intranet verification (X4); after the intranet authentication is passed, the access center does not interpret the activation state information DS-RK (X5) in the request; the authentication center performs DEA inverse operation on the DS-RK, and a temporary indication result is not obtained (X6); the authorization center sends a temporary transmission certificate which cannot be sent to the request node, and a transmission interface is opened (X7); after the requesting node authorizes, the destination port is not connected, and the transmission is completed (X8). The reason why the five events together form the event M21 is that if one of the events is not true, the large area outage event of the present case will not occur, and the relationship is: m21 ═ M4 × M5 × M6 × M7 × M8.
According to the large-scale power failure fault evolution path of the interconnected power grids of Argentina and Uyery, in order to facilitate accident tree analysis, key elements capable of reflecting event evolution are selected, and all event elements are numbered, and are shown in Table 1.
Table 1 event notation
Symbol Event(s)
T Multinational large area power outage
M11 Argentine grid fault
M12 Large area power failure of Uguay
M21 Argentina power grid cross-network authentication process suffering network attack
X1 Failure of heterogeneous network convergence
X2 The full-time personnel of the power grid fail to make correct treatment measures
X3 Misoperation of power grid full-time personnel due to failure of correct authentication of child node authorization
X4 Intranet authentication failure
X5 Access center unexplained activation state information
X6 The authentication center does not obtain a temporary indication result
X7 Failure of the transient transmission certificate to be sent to the requesting node
X8 The target port is not successfully connected to complete the transmission
S2, determining a minimum cut set of basic events in the accident tree, and calculating the structural importance of each bottom event in the accident tree according to the minimum cut set;
the accident tree of argentina and yerba-guay internet failures was analyzed using FreeFta software to obtain its minimal cut set, see table 2.
TABLE 2 Argentina and Urugright Internet Fault minimal Get Table
Classification Combining events
Minimal cut set K1={X1,X2,X3,X4,X5,X6,X7,X8}
And (3) selecting a structural importance algorithm for approximate calculation:
in the formula (I), the compound is shown in the specification,
Figure BDA0002254401750000072
a structural importance coefficient for the ith elementary event; k is the total number of the minimum cut sets; k is a radical of jIs the jth minimal cut set; n is jK is the ith basic event jThe number of basic events of the cutset.
The structural importance of the accident tree bottom events is calculated and sorted by combining the formula (1) and the minimal cut set in table 2, which is shown in table 3.
TABLE 3 structural importance calculation of incident Tree bottom events
Basic events Importance of structure Basic events Importance of structure
X1 0.0078125 X5 0.0078125
X2 0.0078125 X6 0.0078125
X3 0.0078125 X7 0.0078125
X4 0.0078125 X8 0.0078125
The structural importance of the accident tree bottom events is equal, and the sequence is as follows:
I(X8)=I(X7)=I(X6)=I(X5)=I(X4)=I(X3)=I(X2)=I(X1)
based on the analysis conditions of the faults of the Argentina and the Uyery interconnected network, when the fault tree analysis is carried out on the occurred fault, the basic event is often selected based on the early-stage investigation result and the possible event is eliminated, so that the fault tree mainly comprises an AND gate or has fewer gates. As shown in fig. 2, the accident tree analysis diagram is mainly used for verifying the correctness of the analysis of the accident tree at this time, because the cross-network authentication flow under multi-network convergence is subjected to network attack and the daily operation and maintenance of the different-network convergence is improper, and is consistent with the actual survey report.
S3, performing BowTie risk assessment based on the accident tree, determining a danger source, a risk event, a risk threat and a potential result, and setting a barrier for preventing the occurrence of the emergency power event to perform BowTie risk management and control.
BowTie risk assessment is carried out based on an accident tree analysis chart, and the large-scale power failure event is mainly caused by network attack on a cross-network authentication process under multi-network fusion and improper daily operation and maintenance of different-network fusion. The cross-network authentication process under multi-network fusion suffers from network attack and improper daily operation and maintenance of different-network fusion, and the root is caused by the loss of power grid operation management. The large-scale power failure event not only causes the equipment of Argentina Leita hydropower station to be damaged and a large amount of load to be lost, causes the power failure of important users such as public transportation, commercial activities and the like, but also causes the 'large-scale fault' of interconnected power grids of Argentina, Paraguay and Uraguay, and finally causes the complete power failure of three countries. Through the analysis, three risk threat events, namely network attack on the cross-network authentication process under multi-network fusion, improper daily operation and maintenance of different-network fusion and power grid operation management loss are determined; load loss, power failure of important users, equipment damage and loss are potential result events; combining with the practical management of the power grid, a defensive measure barrier is established from the perspective of equipment design and risk control of the power grid, and because the structural importance degrees of all bottom events of the accident tree are equal, namely the influence degrees of all bottom events on top events are the same, the defensive measure barrier is established against all risk threats without the difference of the sequence, which is shown in table 2; a corrective action barrier is established from an emergency disposal perspective, as shown in table 3. Through the analysis of the threat, the protection barrier, the consequence and the control measure, a BowTie visual analysis chart taking large-scale power failure as a top-level event is established, as shown in FIG. 3.
TABLE 2 defensive action barriers established in terms of risk threats
Figure BDA0002254401750000081
TABLE 3 corrective action Barrier based on potential results
Figure BDA0002254401750000091
The accident tree analysis method is adopted to carry out layer-by-layer deep analysis on the sudden power event, so that not only can the direct reason of the sudden power event be analyzed, but also the potential reason of the accident can be deeply revealed, the corresponding protective barrier is drawn on the basis of the accident tree analysis diagram, the safety measure corresponding to the protective barrier is determined, and the visual display is carried out on all the layer events and the protective barriers in the whole accident, so that a decision maker is clear at a glance, the rapid scientific judgment of the emergency decision maker is facilitated, and the accident can be timely stopped by adopting the correct measure.
While the present invention has been described in detail with reference to the preferred embodiments, it should be understood that the above description should not be taken as limiting the invention. Various modifications and alterations to this invention will become apparent to those skilled in the art upon reading the foregoing description. Accordingly, the scope of the invention should be determined from the following claims.

Claims (7)

1. A deduction method for sudden power events of a ubiquitous power Internet of things is characterized by comprising the following steps:
s1, taking the emergency power event as a top event, performing accident tree analysis, and determining a basic event for triggering the top event and a bottom event for triggering the basic event;
s2, determining a minimum cut set of basic events in the accident tree, and calculating the structural importance of each bottom event in the accident tree according to the minimum cut set;
s3, performing BowTie risk assessment based on the accident tree, determining a danger source, a risk event, a risk threat and a potential result, and setting a barrier for preventing the occurrence of the emergency power event to perform BowTie risk management and control.
2. The deduction method of the sudden power event of the ubiquitous power internet of things according to claim 1, wherein the structural importance degree is calculated by the following formula:
Figure FDA0002254401740000011
in the formula (I), the compound is shown in the specification,
Figure FDA0002254401740000012
a structural importance coefficient for the ith elementary event; k is the total number of the minimum cut sets; k is a radical of jIs the jth minimal cut set; n is jK is the ith basic event jThe number of basic events of the cutset.
3. The method as claimed in claim 1, wherein the barriers for preventing the occurrence of the emergency power event include defense barriers, corrective barriers, and anti-interference barriers.
4. The deduction method of the sudden power event of the ubiquitous power internet of things as claimed in claim 3, wherein the defensive measure barriers are established according to the danger source, the risk event and the risk threat of the top event, and the corresponding defensive measure barriers are sequentially established according to the structural importance degree of the bottom event corresponding to the danger source, the risk event and the risk threat from large to small.
5. The deduction method of the sudden power event of the ubiquitous power internet of things as claimed in claim 1, wherein if the event corresponding to the hazard source and/or the risk event and/or the risk threat is a basic event, the first event establishes a defensive measure barrier corresponding to the basic event.
6. The method as claimed in claim 3, wherein the corrective action barrier is established according to the potential result of the top event.
7. The method as claimed in claim 3, wherein the countermeasure barrier against disturbance factors is established according to disturbance factors that may cause the defense barrier and/or the corrective barrier to fail.
CN201911047117.4A 2019-10-30 2019-10-30 Deduction method for emergency power event of ubiquitous power Internet of things Pending CN110782173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911047117.4A CN110782173A (en) 2019-10-30 2019-10-30 Deduction method for emergency power event of ubiquitous power Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911047117.4A CN110782173A (en) 2019-10-30 2019-10-30 Deduction method for emergency power event of ubiquitous power Internet of things

Publications (1)

Publication Number Publication Date
CN110782173A true CN110782173A (en) 2020-02-11

Family

ID=69387876

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911047117.4A Pending CN110782173A (en) 2019-10-30 2019-10-30 Deduction method for emergency power event of ubiquitous power Internet of things

Country Status (1)

Country Link
CN (1) CN110782173A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950064A (en) * 2021-03-29 2021-06-11 国网电力科学研究院有限公司 Power grid security risk influence factor analysis method and device
CN113919186A (en) * 2021-12-14 2022-01-11 中国民航大学 Event tree-based method for calculating severity of synthetic consequence of primary overrun event
CN114648025A (en) * 2022-05-18 2022-06-21 国网浙江省电力有限公司信息通信分公司 Power grid data processing method and system based on multi-dimensional evolution diagram in power field

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102937239A (en) * 2012-08-17 2013-02-20 中国海洋石油总公司 Monitoring method for LNG storage tank safety by means of fault tree and HAZOP
CN103074895A (en) * 2013-01-03 2013-05-01 长安大学 Safety evaluating method for foundation pit anchor rod un-sticking
CN105825342A (en) * 2016-03-22 2016-08-03 中国特种设备检测研究院 Pipeline failure possibility evaluation method and system
CN107563639A (en) * 2017-08-31 2018-01-09 中国农业银行股份有限公司 Evaluating information system risk device and method based on fault tree

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102937239A (en) * 2012-08-17 2013-02-20 中国海洋石油总公司 Monitoring method for LNG storage tank safety by means of fault tree and HAZOP
CN103074895A (en) * 2013-01-03 2013-05-01 长安大学 Safety evaluating method for foundation pit anchor rod un-sticking
CN105825342A (en) * 2016-03-22 2016-08-03 中国特种设备检测研究院 Pipeline failure possibility evaluation method and system
CN107563639A (en) * 2017-08-31 2018-01-09 中国农业银行股份有限公司 Evaluating information system risk device and method based on fault tree

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
孙殿阁;孙佳;王淼;秦康;: "基于Bow-Tie技术的民用机场安全风险分析应用研究", 中国安全生产科学技术, no. 04 *
廖彬强;: "试析事故树分析在大型电力事故(事件)调查中的应用", 低碳世界, no. 35 *
沈国栋, 朱伟阳: "电力生产事故树分析系统研究与开发", 水利电力劳动保护, no. 04, pages 33 - 36 *
沈国栋,朱伟阳: "电力生产事故树分析系统研究与开发" *
王洪德;张艳潮;李斯;: "基于Bow-tie模型的高铁运营安全风险分析", 辽宁工程技术大学学报(自然科学版), no. 07 *
萧镜辉 等: "事故树分析在大型电力事故(事件)调查中的应用", 《电气技术》, no. 9, pages 199 - 200 *
赵然: "基于事故树的输变电项目安全预警管理研究", pages 042 - 1168 *
邱宇;何毅斌;丁克勤;王志杰;刘诗文;: "门式起重机危险源辨识研究" *
邱宇;何毅斌;丁克勤;王志杰;刘诗文;: "门式起重机危险源辨识研究", 起重运输机械, no. 12, pages 69 - 72 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112950064A (en) * 2021-03-29 2021-06-11 国网电力科学研究院有限公司 Power grid security risk influence factor analysis method and device
CN112950064B (en) * 2021-03-29 2022-10-04 国网电力科学研究院有限公司 Power grid security risk influence factor analysis method and device
CN113919186A (en) * 2021-12-14 2022-01-11 中国民航大学 Event tree-based method for calculating severity of synthetic consequence of primary overrun event
CN114648025A (en) * 2022-05-18 2022-06-21 国网浙江省电力有限公司信息通信分公司 Power grid data processing method and system based on multi-dimensional evolution diagram in power field

Similar Documents

Publication Publication Date Title
CN110782173A (en) Deduction method for emergency power event of ubiquitous power Internet of things
Baggott et al. A risk analysis framework for cyber security and critical infrastructure protection of the US electric power grid
Wang et al. Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory
Khezrimotlagh et al. MILP modeling of targeted false load data injection cyberattacks to overflow transmission lines in smart grids
Jung et al. Towards a collaborative framework to improve urban grid resilience
Maccarone et al. Bayesian games for the cybersecurity of nuclear power plants
Cai et al. A framework analyzing system status and human activities: Illustrated using 2011 Fukushima nuclear power plant accident scenarios
Vichova et al. Power outage in the hospitals
Amorim et al. An INRS cause tree method assessment for complex accidents analysis: Application to the Fukushima Nuclear Power Plants accident
Kančev A plant-specific HRA sensitivity analysis considering dynamic operator actions and accident management actions
Han et al. Development of Nuclear Safety Culture evaluation method for an operation team based on the probabilistic approach
Yu et al. Cascading Failure Propagation in Cyber Physical Power Systems under Extreme Weather Events
CN106789182A (en) The detection points-scoring system and implementation method of the automatic assessment device of power plant's hierarchical protection
CN113922347A (en) Ground protection fixed value optimization method and system based on mismatch degree evaluation index and storage medium
Tian et al. A cybersecurity risk assessment method and its application for instrumentation and control systems in nuclear power plants
Hari Prasad et al. Risk management of NPPs using risk monitors
Yun et al. An integrated EDMG to deal with extensive damage for NPPs in China
Wen et al. Risk Assessment of Security and Stability Control System against Cyber Attacks
Brezhnev et al. Cyber diversity for security of digital substations under uncertainties: assurance and assessment
Johnsen et al. Enhancing the safety, security and resilience of ICT and SCADA systems using action research
Lee et al. Analysis of fukushima accident in resilience engineering perspective using the FRAM (Functional Resonance Analysis Method)
Kpoze et al. Cybersecurity Risk Assessment for Beninese Power Grid SCADA system
Jiang et al. A Risk Management Model for Power Industry based on Impact Analysis
Jenkins Using Consequence-Based Assessment Techniques to Improve Standard Risk Matrix Results
Faramondi et al. A Strategy to Improve Infrastructure Survivability via Prioritizing Critical Nodes Protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination